Alexa is Amazon’s cloud-based voice assistant for which the security researchers have recently developed a new malicious ‘skill’ that can turn your Amazon Echo into a full-fledged spying device. Amazon Echo is an Alexa enabled smart home speaker which you control with your voice. It allows you to get your things done by using your...

Security researchers have discovered a Nintendo Switch vulnerability in Nvidia’s Tegra line of embedded processors which enables the attackers to run arbitrary code on all currently available consoles. Nicknamed Fusée Gelée and ShofEL2, the exploits lead to a coldboot execution hack that can be forced by the users to install Linux, run unofficial games, custom...

A new vulnerability was discovered in Linkedin’s popular AutoFill functionality where it has been found to be leaking its users’ personal information to third party websites without the knowledge of the user. LinkedIn has been providing an AutoFill plugin since a long time that are used by other websites to allow the LinkedIn users to...

Facebook has announced that they are building a team to create its own hardware chips together with other tech giants like Google, Apple, and Amazon to be more self-reliant. Facebook has posted about the job opening and it says that they are looking for experts in ASIC and FPGA— which are the two custom silicon...

Another critical flaw has been found in Drupal website, the open source content management framework and it is time to update it once more. Within a month it is the second time that a vulnerability has been found in Drupal which allows remote attackers to bring about advanced attacks including cookie theft, keylogging, phishing and...

Today Internet is part of anything and we can’t imagine a life without Internet. Internet is very useful in daily life and Internet connected technology called the Internet of Things (IoT) with assistants like Siri, smart watches, cars, fridges, lights etc. are in use today. Large and small enterprises are not able to secure all...

CyberArk Enterprise Password Vault application has been detected with a critical vulnerability which allows the hackers to attain unauthorized entry to the system with the advantage of the web application. Enterprise password manager (EPV) solutions enables the companies to safely manage their passwords, control privileged accounts passwords across a large number of client/server and mainframe...

A new hacking group named ‘JHT’ has hacked a large number of CISCO devices of the Russian and Iranian organizations during the previous week. They left a message “Don’t mess with our elections” an American flag. Iranian Communication and Information Technology Minister Mr MJ Azari Jahromi, said that the campaign has affected nearly 3,500 network...

Auth0’s identity-as-a-service have been found to have a critical authentication bypass vulnerability that allows a hacker to access any application or portal that uses Auth0 service for authentication. Auth0 helps you with authentication and authorization for a number of platforms including the potential to integrate social media authentication into an application. Auth0 being one of...

In Finland’s 3rd largest data breach it is estimated that around 130,000 Finnish users have their passwords compromised. Finnish Communications Regulatory Authority (FICORA) has warned its users about the huge data hacking in a website which is maintained by the New Business Centre in Helsinki called Helsingin Uusyrityskeskus. It is a company that provides business...